首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对当前后勤物资消耗测算方法过于简单粗略的问题,以构建有效的后勤物资消耗测算系统为目的,对系统的设计进行了需求分析。介绍了后勤物资消耗测算的基本流程以及关键理论,研究了后勤物资消耗测算系统的用户特点以及应用流程,着重对系统的功能需求进行了分析,确定了系统各主要功能的相关内容,并按照功能需求确定了系统的组成结构和接口关系,为系统的设计和实现奠定了基础。  相似文献   

2.
开发辅助系统是实现需求论证工程化的重要环节,是提高装备型号需求论证质量与效率的有效手段。通过对装备型号需求论证辅助系统的功能需求和系统需求进行分析,明确了系统设计的目标;对系统组成及综合集成方案进行了研究,确定了系统设计框架;设计了软件系统功能结构和软件体系结构,开发了相应的软件系统,同时以装甲装备型号需求论证流程为例,对软件系统的应用模式进行了研究。  相似文献   

3.
根据编队协同防空作战的特点和需求,设计并开发了一个基于高层次体系结构(HLA)的多平台协同制导作战仿真系统.阐述了该系统设计的总体结构和工作原理,提出了主要功能模块需求,重点分析了主要系统单元的信息交互与控制流程.根据上述分析,对系统进行了联邦开发、对象类和交互类设计以及流程设计.最后,通过仿真实例验证了该系统的可行性...  相似文献   

4.
军事总体设计是技术总体设计的基础,是模拟训练系统设计的首要任务.对于战术互联网模拟训练系统军事总体设计中的有关问题,采用对比和比较法,对系统军事总体需求和框架进行了研究,明确了战术互联网模拟训练系统的训练方式、使用流程、功能体系等内容,为下一步系统的技术总体方案设计以及实现奠定了良好基础.  相似文献   

5.
海上补给计算机仿真训练系统框架设计研究   总被引:2,自引:2,他引:0  
在分析海上补给仿真训练系统的用户需求的基础上,确定了海上补给仿真训练系统应该具备的功能,在此基础上对系统的组成、体系设计进行深入的研究。  相似文献   

6.
军队抢险救灾物资消耗的确定,一直是困扰着各级部队的难题,也是影响部队战斗力再生的重要因素。军队抢险救灾物资消耗的确定可采用确定资金和确定实物来完成。通过建立数学模型对物资消耗进行计算,利用实例分析验证物资消耗模型。通过物资消耗模型解决了以往物资消耗确定的难题,减少了部队抢险救灾的隐形消耗。  相似文献   

7.
关注军队后勤物资采购模式的发展,研究网上联合采购这种新型的采购方式。在分析了目前军队后勤物资采购现状的基础上,首先介绍一种多Agent中介系统主导的联合采购市场模型IMASCPM,然后针对各单位具有多样化、个性化复杂需求关系的组合购买问题,给出一种后勤物资联合采购的联盟规划算法,对其算法复杂性进行了分析,并与国外相关研究进行了比较。  相似文献   

8.
为做好高山寒地战场环境下的战时弹药保障,深入剖析了高寒地区弹药供应保障需求,对弹药供应保障的数量需求、供应种类需求进行了分析。利用目标价值排序、需求量测算的方法分析了弹药供应的数量需求,给出了弹药需求量测算流程;结合弹药目标配对流程,通过计算各弹种打击该目标的经济性指标、时间性指标给出了弹药供应种类需求。科学的弹药保障供应需求研究,对于做好物资保障准备,科学应对边境反击作战具有重要的意义。  相似文献   

9.
徐明  刘振宇  方勇 《国防》2006,(1):53-54
未来信息化条件下高技术局部战争,作战物资消耗大、部队机动距离远、战场支援保障复杂,预备役部队后勤如何适应未来作战需求,成建制形成支援保障能力,是当前预备役部队做好军事斗争准备必须研究解决的关键问题之一。笔者认为,提高预备役部队成建制支援保障能力,应高度关注以下两个方面的问题。一、预测需求,多方筹措,科学制订支援保障行动预案预备役部队后勤成建制形成支援保障能力,首要的工作是抓好支援行动方案和计划的制订及论证。一是测需求,摸底数,全面掌握动员潜力。预备役部队后勤部门应根据战时担负的后勤支援保障任务,科学测算战场…  相似文献   

10.
在战场环境下,负责后勤物资分发与转运战场补给中心随时会受到敌方的打击,给后勤供应系统的设计优化带来了巨大挑战。鉴于此,研究了战场不确定环境下的后勤物资供应网络设计优化问题,考虑了供应和需求的不确定性,建立了优化问题的整数规划模型,并开发了基于拉格朗日松弛的启发式求解算法。采用50个小规模的测试用例(包含5个供应节点、20个候选补给中心节点以及50个作战单元节点)和50个大规模测试用例(包括20个供应节点、100个后勤补给中心节点以及500个作战单元节点)测试了算法的有效性与鲁棒性。计算结果显示基于拉格朗日的求解算法可以在短时间内给出问题的近似最优解。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号